ema-logo-secondary-c

Why Optimizing your Cloud Service Provider(s)—is Still an Industry Work in Progress

By Dennis Drogseth on Jun 23, 2014 1:28:48 PM

A year ago, EMA did some rather eye-opening research about what it takes to deliver business services over a mix of public and private, and non-cloud infrastructures. The research—dubbed “Ecosystem Cloud”—showed that an overwhelming 94% of the respondents felt that monitoring “inside” public cloud infrastructures was important—and 63% felt it was “very important” or “critical.” [...]

Continue Reading

Workload Automation is Not Just For Large Enterprises Anymore

By Steve Brasen on Jun 12, 2014 11:16:50 AM

The term, “workload automation,” often conjures images of an army of robots zipping around an enterprise performing arduous tasks while the IT manager sits comfortably in a lounge chair at the back of the data center sipping a Mai Tai. Well, it’s not quite that Jetsonesque just yet – we’ll have to wait a few years for the robots and Mai Tais – but there is a fundamental truth in how workload automation dramatically reduces management effort and improves IT performance. Put simply, workload automation (sometimes still referred to as “job scheduling”) aggregates the placement and execution of individual business processes (i.e. applications, data bases, web services, or any other jobs that would be hosted by an enterprise IT system) to the optimal location (e.g. a server, a cloud, or a virtual machine) at the appropriate time to maximize performance and minimize costs.

Continue Reading

Top 5 Indications It’s Time to Transition to a Hybrid Cloud

By Steve Brasen on Jun 11, 2014 1:07:21 PM

A core precept in cloud computing is that it must deliver the illusion of infinite scalability.  That is, it must fulfill the expectation that any and all workloads will continuously operate at peak performance regardless of the size and number of jobs being added.  In reality, however, private cloud deployments are finite with limited compute, storage, and network resources. It’s kind of like a room full of mirrors – it seems to go on forever, but stretch your hand out and you’ll hit a wall.  The trick to successfully maintaining the illusion of infinite scalability is to allow workloads to extend beyond the scope of a single private cloud into other clouds and, in particular, into public clouds. Adopting this hybrid cloud approach also introduces opportunities for significant cost reductions and increased workload flexibility.

Continue Reading

Advanced Operational Analytics (AOA) – Transformative Use Cases from EMA Research

By Dennis Drogseth on Jun 9, 2014 10:16:37 AM

Steve Smythe discusses how IT Operations is transformed by big data solutions in his latest blog, “Transformation of IT operations with big data solutions.” Is this a reality? The answer—agreed upon here—is almost certainly “yes.” However, it should be pointed out that “big data,” or “IT Operations Analytics,” or as EMA calls it, “Advanced Operational [...]

Continue Reading

Integrated ITSM—the Service Desk + Operations + Analytics

By Dennis Drogseth on May 16, 2014 9:05:13 AM

It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s [...]

Continue Reading

Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management

By David Monahan on Apr 29, 2014 11:56:20 AM

On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided through Risk I/O, remediation and mitigation prioritization are done less in a bubble of the operational environment and more in context with the Internet threat universe.

Continue Reading

Gaining Data Control with BYOD and Bluebox

By David Monahan on Apr 22, 2014 10:51:06 AM

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control!

Continue Reading

Symantec CyberWar Games Provide Valuable Cyber-Insight

By David Monahan on Mar 3, 2014 6:40:11 PM

The emotions oscillate between high frustration and high jubilation as I observe cyber-attack teams’ hacking activities against an unnamed financial institution…

Continue Reading

CA Analyst Symposium- CA is Changing

By David Monahan on Mar 3, 2014 6:39:56 PM

I had an interesting experience a few weeks ago.  I went to NYC to brief with CA Technologies.  I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 on 1 meeting with GM of Security Management Mike Denning,.  I found their discussions and candor on the changes and advancements within CA VERY refreshing; more so than I would have expected from what I perceived as a “monolithic behemoth” such as CA.
Continue Reading

Software Defined Storage: The Vendor Landscape – Part 2 of 2

By Torsten Volk on Feb 17, 2014 9:42:23 AM

As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts